Latency and Power Aware Reliable Intrusion Detection System for Ensuring Network Security in Military Applications
L. Sheeba1, V. S. Meenakshi2

1L. Sheeba, Research Scholar, Bharathiyar University, Coimbatore (Tamil Nadu), India.
2Dr. V. S. Meenakshi, Assitant Professor, Chikkena Government Arts College, Trippur (Tamil Nadu), India.
Manuscript received on 10 October 2019 | Revised Manuscript received on 19 October 2019 | Manuscript Published on 02 November 2019 | PP: 367-375 | Volume-8 Issue-2S11 September 2019 | Retrieval Number: B10570982S1119/2019©BEIESP | DOI: 10.35940/ijrte.B1057.0982S1119
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Intrusion detection system is a most concerned research area which needs to be detected earlier to avoid the unwanted network errors and problems. The accurate and reliable intrusion detection is a most focused research problem in various domains which is found to be more difficult issue. This is focused and resolved in the previous research work namely Prioritization Based Delay Avoided Secured and Reliable Data Transmission Method (PBDASRDT). However, this research method doesn’t focus on the energy conservation parameters. And also previous work doesn’t discuss about the security provisioning methods. This is focused and resolved in this research method by introducing the method namely Latency and Power aware Reliable Intrusion Detection System (LP-RIDS). In this research method latency and power consumption of servers in which intrusion detection is performed is reduced considerably by introducing the secondary cluster head selection process. This secondary cluster head can perform the energy management of IDS servers optimally between the nodes and gateway. And then security of the intrusion detection system is enhanced by introducing the dynamic key based encryption technique. Here the dynamic key generation process is done in the secondary cluster head and the encryption is done by using AES technique. This methodology can improve the network performance considerably by detecting the attacks more accurately with reduced latency and delay. The overall evaluation of the research method is done in the NS2 simulation environment from which it is proved that the proposed research method leads to ensure the enhanced outcome than the existing research methods. This method proved to provide the protection from the denial of service attacks in the efficient way, thus ensuring security with reduced computational cost.
Keywords: Secured Data Transmission, Intrusion Detection, Latency and Power Reduction, Secondary Cluster Head, Dynamic Key Generation, Encryption.
Scope of the Article: Low-power design